Undecidability of bounded security protocols

Size: px
Start display at page:

Download "Undecidability of bounded security protocols"

Transcription

1 Unciabilit of boun scurit protocols urgin Licoln itchll Scrov FSP Trnto Ital Jul 999 /5/0 Outlin Goals an motivations Snta an smantics oun protocols Eampl LLF Conclusions Qustions /5/0 otivation Scurit protocols ar ifficult to sign an analz Subtltis involving crptographic primitivs ultipl concurrnt runs Vrification of a simpl protocol ma combin an numbr of ata from vali or abort runs To arss ths problms a varit of formal mthos for scurit has bn vlop olv-yao mol ializ assumptions about crptographic primitivs an nontrministic avrsar /5/0

2 otivation olv-yao ol ssags ar compos of inivisibl abstract valus Encrption is mol in an ializ wa lac-bo mol of ncrption/crption Possibl intrur actions ar non-trministic an appli throughout th protocol Ra an bloc an mssag compos a mssag into parts Gnrat frsh ata whn n Compos a nw mssag from nown an gnrat ata an put it on th ntwor /5/0 4 Snta an Smantics Vocabular or first-orr signatur Contains smbols that can b us Trm Wll-form prssion ovr th signatur Fact first-orr atomic formula ovr th signatur Stat multi-st of facts Transition rwrit rul containing pr- an post conitions Rwrit Rul using istntial quantification F... F... j. G... G thor is a finit st of facts an rwrit ruls of form l r n /5/0 5 [ / ].... φ ψ ψ Snta an Smantics φ is not fr in an othr hpothsis Eistntial limination rul Eistntiall quantifi aiom.φ Som formula ψ w smbol for th that is prsum to ist riv ψ from [/]ø Th si conition mans that th onl hpothsis in th proof that can contain is th hpothsis [/]ø /5/0 6

3 Snta an Smantics Eampl stat S rul R S = { P f a P b} R = P z. Q f z Rsult application of th rul an a nw valu c for z rsult in succssor stat S S = { Q f f a c P b} /5/0 7 oun Protocols fin multi-st rwriting framwor can b us to scrib finit-stat an infinit-stat sstms Using functions it is possibl to scrib computation ovr unboun ata tps { n} { f n } Eas to nco formulas as countr or Turing machins Principal authntication an scrc protocols ar mostl of boun lngth finit-stat sstms Wll-foun thoris sntactic form of a class of wllfoun protocol thoris /5/0 8 oun Protocols Wll-foun thoris Cration consumption prsistnc finitions about how facts ar crat consum an prsrv Protocol thoris fins how initial stats an protocol stps of participants ar mol rols Intrur thoris fins istinction btwn Initialization an I/O composition an Composition ruls Protocol an intrur fins how intrur bhavior is combin with th stps of th othr participants /5/0 9

4 oun Protocols Participants Initialization Thor istributs s an stablishs shar information Rol Gnration Thor fins th rols a principals can act in Protocol Thoris scribs which stps th principals can prform Intrur Two-Phas Intrur Thor Initializs th intrur an scribs actions it can prform /5/0 0 Eampl ham-schror Initialization Thor GOOGUY.. GooGu P EY.. P a GooGu nn GooGu agu nn a /5/0 Eampl ham-schror Rol Gnration Thor ROL GooGu GooGu ROL GooGu GooGu 0 0 /5/0 4

5 5 /5/0 Eampl ham-schror Protocol Thoris an nc nn nc nn nc nc nc nn nc nn R S R S R S /5/0 4 Eampl ham-schror Two-Phas Intrur Thor Initialization Ruls I/O Ruls a a LR C S REC Ri Si /5/0 5 Eampl ham-schror Two-Phas Intrur Thor composition Ruls P nc P EC nc nc nc LR nc nc P EC LR CP

6 Eampl ham-schror Two-Phas Intrur Thor Composition Ruls COP C C C USE C EC C C nc GE. /5/0 6 C 0000 Protocols w/o noncs C if snt thn rspon if snt 0 if snt 0 if snt 0 thn rspon thn rspon 0 thn rspon 00 if snt 0 thn rspon If intrur routs mssag from through - principals C will rval Thrfor to compromis scurit ponntial tim is n an scrc cannot b compromis in polnomial tim Evn without nw noncs cision problm is P an EXP-tim har ut woul not b consir scur unr olv-yao assumptions /5/0 7 /EXP tim harnss Intrur attac tr EXP-tim ponntial tim n whn attac follows on path at a tim EXP-tim ponntial tim n whn attac starts all paths at onc so shortst path is ponntial /5/0 8 6

7 Unciabilit Thorm 4. Th implication problm for istntial Horn clauss without function smbols is unciabl. In particular thr is no algorithm for ciing whthr a st of istntial Horn clauss without function smbols implis a singl atomic formula b b without function smbols or variabls. This thorm has a straight-forwar irct proof bas on aiomatizing a Coo s thorm stl Turing machin tablau. /5/0 9 Unciabilit Protocol thor in rstrict form. i j = stats of agnts = ntwor mssags Prsistnt facts rmov gnt 0 a0 α α j. a β βl Can b writtn as a Horn claus [ ] i α α j β β /5/0 0 l Unciabilit Intrur stors ncrption of all atomic formulas rivabl from a givn Horn thor without function smbols rplaing ths mssags it is tring to carr out an arbitrar uction ut from thorm 4 follows that thr is no algorithm to ci if this uction is succssful or not Thrfor scrc is unciabl /5/0 7

8 LLF LF logical framwor Thr-lvl calculus for objcts familis an ins Offrs a uction sstm to ma proofs Etnsion of th LF logical framwor Linar implication o itiv conjunction & itiv truth /5/0 LLF LLF Linar Logic Framwor a linar logic tool is us to To sarch cutions of a protocol an intrur for protocol flaws Formall vrif proofs of protocol optimizations /5/0 LLF ultist rwriting an LLF Each transition rul can b writtn as n m n m This allows to us linar logic tools for th protocol analsis /5/0 4 8

9 Eampl of Rul nn na. 0 LLF S nc nn loop o- ann o- a0 o- {aatm} a -o tot ns a m -o loop. /5/0 5 Conclusions Scrc is EXP-tim har whn no nw ata not PSPCE har! Othrwis scrc is unciabl vn for rstrict classs of protocols Usful notation for amining olv-yao mol with LLF tools It is possibl to prform lowr-bouns analsis /5/0 6 Rfrncs Unciabilit of boun scurit protocols!""# $"%&' " " & *+++!"!ta-otation for Protocol nalsis.!&$%-.+*+++!"&# Linar Logical Framwor"# '%" '!'%!/+. 0--!'% ""%0.4-0 *++. &#'' & &' 5&' 5"!' 67" ""%*4+-*8**++* /5/0 7 9

10 Qustions. What is th rol of noncs in th unciabilit of scurit protocols? Eplain. For protocols w/o noncs alra non-polnomial tim n to ci scrc EXPTIE-har With an unlimit numbr of noncs scrc bcoms unciabl Intuitiv rasoning oun numbr of noncs arbitrar numbr of protocol runs o nw ata ll possibl combinations can b chc Rsult ciabilit Unboun numbr of noncs an arbitrar numbr of protocol runs ot all possibl runs can b chc Rsult Unciabilit Thortical rasoning Using Horn fragmnts /5/0 8 Qustions. What ar th avantags of using multist rwriting spciall in rgar to th intrur mol us? fin multi-st rwriting framwor can b us to scrib finit-stat an infinit-stat sstms Using functions it is possibl to scrib computation ovr unboun ata tps Eas to nco as countr or Turing machins olv-yao mol on-trministic intrur Ruls can rsmbl intrur actions Ra Sn Compos compos Gnrat rbitrar choic of a rul that can b appli givs nontrminism Intrurs can b rus for iffrnt protocols onl mssag format has to b aapt /5/0 9 Qustions. What os th unciabilt of scrc man for ral protocol instancs? What os it man for mols us for formal vrification? Ral protocol instancs Using unboun numbr of noncs mas it a mutual isavantag as it impossibl for signr to vrif scrc Harr for intrur to unrmin scurit of protocol Formal vrification mols oncs ar abstract an/or limit in most formal vrification mthos Thrfor scrc proofs ar usuall ma on this limit mols but o not trmin th scrc of ral protocols /5/0 0 0

Register Allocation. Register Allocation

Register Allocation. Register Allocation Rgistr Allocation Jingk Li Portlan Stat Univrsity Jingk Li (Portlan Stat Univrsity) CS322 Rgistr Allocation 1 / 28 Rgistr Allocation Assign an unboun numbr of tmporaris to a fix numbr of rgistrs. Exampl:

More information

Principles of Programming Languages Topic: Formal Languages II

Principles of Programming Languages Topic: Formal Languages II Principls of Programming Languags Topic: Formal Languags II CS 34,LS, LTM, BR: Formal Languags II Rviw A grammar can b ambiguous i.. mor than on pars tr for sam string of trminals in a PL w want to bas

More information

The Network Layer: Routing Algorithms. The Network Layer: Routing & Addressing Outline

The Network Layer: Routing Algorithms. The Network Layer: Routing & Addressing Outline PS 6 Ntwork Programming Th Ntwork Layr: Routing lgorithms Michl Wigl partmnt of omputr Scinc lmson Univrsity mwigl@cs.clmson.du http://www.cs.clmson.du/~mwigl/courss/cpsc6 Th Ntwork Layr: Routing & ddrssing

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer: Routing Algorithms. Routing Algorithms Taxonomy

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer: Routing Algorithms. Routing Algorithms Taxonomy PS Intrntworking Th Ntwork Layr: Routing & ddrssing Outlin Th Ntwork Layr: Routing lgorithms Michl Wigl partmnt of omputr Scinc lmson Univrsity mwigl@cs.clmson.du Novmbr, Ntwork layr functions Routr architctur

More information

A New Method For Simultaneously Measuring And Analyzing PLL Transfer Function And Noise Processes

A New Method For Simultaneously Measuring And Analyzing PLL Transfer Function And Noise Processes DsignCon00 Laing Eg Communication Dsign Confrnc A Nw Mtho For Simultanously Masuring An Analyzing PLL Transfr Function An Nois Procsss Mik Li, PhD Jan Wilstrup Wavcrst Corporation 1 Abstract Phas Lock

More information

Ray Tracing. Wen-Chieh (Steve) Lin National Chiao-Tung University

Ray Tracing. Wen-Chieh (Steve) Lin National Chiao-Tung University Ra Tracing Wn-Chih (Stv Lin National Chiao-Tung Univrsit Shirl, Funamntals of Computr Graphics, Chap 15 I-Chn Lin s CG slis, Doug Jams CG slis Can W Rnr Imags Lik Ths? Raiosit imag Pictur from http://www.graphics.cornll.u/onlin/ralistic/

More information

Problem Set 1 (Due: Friday, Sept. 29, 2017)

Problem Set 1 (Due: Friday, Sept. 29, 2017) Elctrical and Computr Enginring Mmorial Univrsity of Nwfoundland ENGI 9876 - Advancd Data Ntworks Fall 2017 Problm St 1 (Du: Friday, Spt. 29, 2017) Qustion 1 Considr a communications path through a packt

More information

CSE 272 Assignment 1

CSE 272 Assignment 1 CSE 7 Assignmnt 1 Kui-Chun Hsu Task 1: Comput th irradianc at A analytically (point light) For point light, first th nrgy rachd A was calculatd, thn th nrgy was rducd by a factor according to th angl btwn

More information

Graph Theory & Applications. Boundaries Using Graphs. Graph Search. Find the route that minimizes. cost

Graph Theory & Applications. Boundaries Using Graphs. Graph Search. Find the route that minimizes. cost Graph Thory & Appliations Bounaris Using Graphs 3 4 3 4 5 Fin th rout that minimizs osts Fin th ritial path in a projt Fin th optimal borr aroun a rgion Fin loop an no quations or analog iruit analysis

More information

An Enhanced Keystroke Biometric System and Associated Studies

An Enhanced Keystroke Biometric System and Associated Studies Procings of Stunt-Faculty Rsarch Day, CSIS, Pac Univrsity, May 2 n, 2008 An Enhanc Kystrok Biomtric Systm an Associat Stuis Tarjani Buch, Anra Cotoranu, Eric Jsky, Florin Tihon, Mary Villani Sinbrg School

More information

Lecture 39: Register Allocation. The Memory Hierarchy. The Register Allocation Problem. Managing the Memory Hierarchy

Lecture 39: Register Allocation. The Memory Hierarchy. The Register Allocation Problem. Managing the Memory Hierarchy Ltur 39: Rgistr Alloation [Aapt rom nots y R. Boik an G. Nula] Topis: Mmory Hirarhy Managmnt Rgistr Alloation: Rgistr intrrn graph Graph oloring huristis Spilling Cah Managmnt Th Mmory Hirarhy Computrs

More information

The Size of the 3D Visibility Skeleton: Analysis and Application

The Size of the 3D Visibility Skeleton: Analysis and Application Th Siz of th 3D Visibility Sklton: Analysis and Application Ph.D. thsis proposal Linqiao Zhang lzhang15@cs.mcgill.ca School of Computr Scinc, McGill Univrsity March 20, 2008 thsis proposal: Th Siz of th

More information

Midterm 2 - Solutions 1

Midterm 2 - Solutions 1 COS 26 Gnral Computr Scinc Spring 999 Midtrm 2 - Solutions. Writ a C function int count(char s[ ]) that taks as input a \ trminatd string and outputs th numbr of charactrs in th string (not including th

More information

Systems in Three Variables. No solution No point lies in all three planes. One solution The planes intersect at one point.

Systems in Three Variables. No solution No point lies in all three planes. One solution The planes intersect at one point. 3-5 Systms in Thr Variabls TEKS FOCUS VOCABULARY TEKS (3)(B) Solv systms of thr linar quations in thr variabls by using Gaussian limination, tchnology with matrics, and substitution. Rprsntation a way

More information

Ray Tracing. Ray Tracing. Ray Tracing. ray object. ray object = 0. Utah School of Computing Spring Computer Graphics CS5600

Ray Tracing. Ray Tracing. Ray Tracing. ray object. ray object = 0. Utah School of Computing Spring Computer Graphics CS5600 Utah School of omputing Spring 20 Wk Ra Tracing S5600 omputr Graphics From Rich Risnfl Spring 203 Ra Tracing lassical gomtric optics tchniqu Etrml vrsatil Historicall viw as pnsiv Goo for spcial ffcts

More information

Lecture Outline. Memory Hierarchy Management. Register Allocation. Register Allocation. Lecture 19. Cache Management. The Memory Hierarchy

Lecture Outline. Memory Hierarchy Management. Register Allocation. Register Allocation. Lecture 19. Cache Management. The Memory Hierarchy Ltur Outlin Mmory Hirrhy Mngmnt Rgistr Allotion Ltur 19 Rgistr Allotion Rgistr intrrn grph Grph oloring huristis Spilling Ch Mngmnt Pro. Boik CS 164 Ltur 17 1 Pro. Boik CS 164 Ltur 17 2 Th Mmory Hirrhy

More information

" dx v(x) $ % You may also have seen this written in shorthand form as. & ' v(x) + u(x) '# % ! d

 dx v(x) $ % You may also have seen this written in shorthand form as. & ' v(x) + u(x) '# % ! d Calculus II MAT 146 Mthods of Intgration: Intgration by Parts Just as th mthod of substitution is an intgration tchniqu that rvrss th drivativ procss calld th chain rul, Intgration by parts is a mthod

More information

TCP Congestion Control. Congestion Avoidance

TCP Congestion Control. Congestion Avoidance TCP Congstion Control TCP sourcs chang th snding rat by modifying th window siz: Window = min {Advrtisd window, Congstion Window} Rcivr Transmittr ( cwnd ) In othr words, snd at th rat of th slowst componnt:

More information

Shift. Reduce. Review: Shift-Reduce Parsing. Bottom-up parsing uses two actions: Bottom-Up Parsing II. ABC xyz ABCx yz. Lecture 8.

Shift. Reduce. Review: Shift-Reduce Parsing. Bottom-up parsing uses two actions: Bottom-Up Parsing II. ABC xyz ABCx yz. Lecture 8. Rviw: Shift-Rduc Parsing Bottom-up parsing uss two actions: Bottom-Up Parsing II Lctur 8 Shift ABC xyz ABCx yz Rduc Cbxy ijk CbA ijk Prof. Aikn CS 13 Lctur 8 1 Prof. Aikn CS 13 Lctur 8 2 Rcall: h Stack

More information

Global Register Allocation

Global Register Allocation Ltur Outlin Glol Rgistr Allotion Mmory Hirrhy Mngmnt Rgistr Allotion vi Grph Coloring Rgistr intrrn grph Grph oloring huristis Spilling Ch Mngmnt 2 Th Mmory Hirrhy Rgistrs 1 yl 256-8000 yts Ch 3 yls 256k-16M

More information

Non Fourier Encoding For Accelerated MRI. Arjun Arunachalam Assistant Professor Electrical engineering dept IIT-Bombay

Non Fourier Encoding For Accelerated MRI. Arjun Arunachalam Assistant Professor Electrical engineering dept IIT-Bombay Non Fourir Encoding For Acclratd MRI Arjun Arunachalam Assistant Profssor Elctrical nginring dpt IIT-Bombay Outlin of th Prsntation An introduction to Magntic Rsonanc Imaging (MRI Th nd for spd in MRI

More information

8.3 INTEGRATION BY PARTS

8.3 INTEGRATION BY PARTS 8.3 Intgration By Parts Contmporary Calculus 8.3 INTEGRATION BY PARTS Intgration by parts is an intgration mthod which nabls us to find antidrivativs of som nw functions such as ln(x) and arctan(x) as

More information

Multi-hypothesis Motion Planning for Visual Object Tracking

Multi-hypothesis Motion Planning for Visual Object Tracking Multi-hypothsis Motion Planning or Visual Objct Tracking Haing Gong, Jack Sim, Maxim Likhachv, Jianbo Shi GRASP Lab, Univrsity o Pnnsylvania Robotics Institut, Carngi Mllon Univrsity hgong@sas.upnn.u,

More information

Summary: Semantic Analysis

Summary: Semantic Analysis Summary: Smantic Analysis Chck rrors not dtctd by lxical or syntax analysis Intrmdiat Cod Scop rrors: Variabls not dfind Multipl dclarations Typ rrors: Assignmnt of valus of diffrnt typs Invocation of

More information

Lecture Outline. Memory Hierarchy Management. Register Allocation. Register Allocation. Lecture 38. Cache Management. Managing the Memory Hierarchy

Lecture Outline. Memory Hierarchy Management. Register Allocation. Register Allocation. Lecture 38. Cache Management. Managing the Memory Hierarchy Ltur Outlin Mmory Hirrhy Mngmnt Rgistr Allotion Ltu8 (rom nots y G. Nul n R. Boik) Rgistr Allotion Rgistr intrrn grph Grph oloring huristis Spilling Ch Mngmnt 4/27/08 Pro. Hilingr CS164 Ltu8 1 4/27/08

More information

2.2 Differential Forms

2.2 Differential Forms 2.2 Differential Forms With vector analsis, there are some operations such as the curl derivative that are difficult to understand phsicall. We will introduce a notation called the calculus of differential

More information

Probabilistic inference

Probabilistic inference robabilistic infrnc Suppos th agnt has to mak a dcision about th valu of an unobsrvd qury variabl X givn som obsrvd vidnc E = artially obsrvabl, stochastic, pisodic nvironmnt Eampls: X = {spam, not spam},

More information

Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, Directed Graphs BOS SFO

Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, Directed Graphs BOS SFO Prsntation for us with th txtbook, Algorithm Dsign and Applications, by M. T. Goodrich and R. Tamassia, Wily, 2015 Dirctd Graphs BOS ORD JFK SFO LAX DFW MIA 2015 Goodrich and Tamassia Dirctd Graphs 1 Digraphs

More information

LAB1: DMVPN Theory. DMVPN Theory. Disclaimer. Pag e

LAB1: DMVPN Theory. DMVPN Theory. Disclaimer. Pag e LAB1: DMVPN Thory Disclaimr This Configuration Guid is dsignd to assist mmbrs to nhanc thir skills in rspctiv tchnology ara. Whil vry ffort has bn mad to nsur that all matrial is as complt and accurat

More information

Internet Technology 3/21/2016

Internet Technology 3/21/2016 Intrnt Tchnolog //6 Roting algorithm goal st hop rotr = sorc rotr last hop rotr = dstination rotr rotr Intrnt Tchnolog 8. Roting sitch rotr LAN Pal Kranoski Rtgrs Unirsit Spring 6 LAN Roting algorithm:

More information

Overview Linear Algebra Review Linear Algebra Review. What is a Matrix? Additional Resources. Basic Operations.

Overview Linear Algebra Review Linear Algebra Review. What is a Matrix? Additional Resources. Basic Operations. Oriw Ro Jnow Mon, Sptmr 2, 24 si mtri oprtions (, -, *) Cross n ot prouts Dtrminnts n inrss Homonous oorints Ortonorml sis itionl Rsours 8.6 Tt ook 6.837 Tt ook 6.837-stff@rpis.sil.mit.u Ck t ours wsit

More information

Extending z/tpf using IBM API Management (APIM)

Extending z/tpf using IBM API Management (APIM) Extnding using API Managmnt (APIM) Mark Gambino, TPF Dvlopmnt Lab March 23, 2015 TPFUG Dallas, TX Th Big Pictur Goal Mobil Applications Cloud APIs Cloud-basd Srvics On-Prmis Entrpris APIs E n t r p r I

More information

Control of Manipulators. Instructor: Jacob Rosen Advanced Robotic - MAE 263D - Department of Mechanical & Aerospace Engineering - UCLA

Control of Manipulators. Instructor: Jacob Rosen Advanced Robotic - MAE 263D - Department of Mechanical & Aerospace Engineering - UCLA Control of Manipulators Avanc Robotic - MAE 263D - Dpartmnt of Mchanical & Arospac Enginring - UCLA Introuction Problm Dfinition Problm Givn: Joint angls snsor raings links gomtry, mass, inrtia, friction,

More information

Chapter 3: Propositional Languages

Chapter 3: Propositional Languages Chapter 3: Propositional Languages We define here a general notion of a propositional language. We show how to obtain, as specific cases, various languages for propositional classical logic and some non-classical

More information

Land restrictions/easements

Land restrictions/easements Land rstrictions/asmnts rwgian Mapping Authority grd.mardal@statkart.no rwgian Mapping Authority Jun 2009 Pag 1 of 9 Tabl of contnts 1.1 Application schma...3 1.2...5 1.2.1... 5 1.2.2 Boundary... 5 1.2.3

More information

Motivation. Synthetic OOD concepts and reuse Lecture 4: Separation of concerns. Problem. Solution. Deleting composites that share parts. Or is it?

Motivation. Synthetic OOD concepts and reuse Lecture 4: Separation of concerns. Problem. Solution. Deleting composites that share parts. Or is it? Synthtic OOD concpts and rus Lctur 4: Sparation of concrns Topics: Complx concrn: Mmory managmnt Exampl: Complx oprations on composit structurs Problm: Mmory laks Solution: Rfrnc counting Motivation Suppos

More information

EE 231 Fall EE 231 Homework 10 Due November 5, 2010

EE 231 Fall EE 231 Homework 10 Due November 5, 2010 EE 23 Fall 2 EE 23 Homwork Du Novmbr 5, 2. Dsign a synhronous squntial iruit whih gnrats th following squn. (Th squn should rpat itslf.) (a) Draw a stat transition diagram for th iruit. This is a systm

More information

Managing Trust Relationships in Peer 2 Peer Systems

Managing Trust Relationships in Peer 2 Peer Systems Managing Trust Rlationships in Pr 2 Pr Systms R.S.SINJU PG STUDENT, DEPARTMENT OF COMPUTER SCIENCE, PONJESLY COLLEGE OF ENGINEERING NAGERCOIL, TAMILNADU, INDIA C.FELSY ASST.PROF, DEPARTMENT OF COMPUTER

More information

On Some Maximum Area Problems I

On Some Maximum Area Problems I On Som Maximum Ara Problms I 1. Introdution Whn th lngths of th thr sids of a triangl ar givn as I 1, I and I 3, thn its ara A is uniquly dtrmind, and A=s(s-I 1 )(s-i )(s-i 3 ), whr sis th smi-primtr t{i

More information

R5F70835AN80FTV R5F70834AN80FTV R5F70835AD80FTV R5F70844AD80FPV 256K. 4 (externally available) -

R5F70835AN80FTV R5F70834AN80FTV R5F70835AD80FTV R5F70844AD80FPV 256K. 4 (externally available) - SuprH amil 32bit RISC SH720 Sris SH7080 Sris SH720 Sris (SH2) Ralizs highprforman (60MHz/320MIPS)) argapait lash mmor Numrous priphral funtions SH7080 Sris (SH2) Highspd opration (80MHz) argapait lash

More information

FLASHING CHRISTMAS TREE KIT

FLASHING CHRISTMAS TREE KIT R4 FLASHING CHRISTMAS TREE KIT 9 10 8 7 11 6 R3 12 T4 C4 5 T3 R5 R7 13 C3 C2 4 14 R1 T2 R6 3 OWNER S MANUAL T1 R8 15 2 C1 R2 1 16 Cat. No. 277-8001 CUSTOM MANUFACTURED FOR TANDY CORPORATION LTD ASSEMBLY

More information

DO NOW Geometry Regents Lomac Date. due. Similar by Transformation 6.1 J'' J''' J'''

DO NOW Geometry Regents Lomac Date. due. Similar by Transformation 6.1 J'' J''' J''' DO NOW Gomtry Rgnts Lomac 2014-2015 Dat. du. Similar by Transformation 6.1 (DN) Nam th thr rigid transformations and sktch an xampl that illustrats ach on. Nam Pr LO: I can dscrib a similarity transformation,

More information

CS153: Compilers Lecture 20: Register Allocation I

CS153: Compilers Lecture 20: Register Allocation I CS153: Copilrs Ltur 20: Ristr Alloation I Stpn Con ttps://www.sas.arvar.u/ourss/s153 Pr-lass Puzzl Wat s t iniu nur o olors n to olor a ap o t USA? Evry stat is assin on olor Aant stats ust ivn irnt olors

More information

Installation Saving. Enhanced Physical Durability Enhanced Performance Warranty The IRR Comparison

Installation Saving. Enhanced Physical Durability Enhanced Performance Warranty The IRR Comparison Contnts Tchnology Nwly Dvlopd Cllo Tchnology Cllo Tchnology : Improvd Absorption of Light Doubl-sidd Cll Structur Cllo Tchnology : Lss Powr Gnration Loss Extrmly Low LID Clls 3 3 4 4 4 Advantag Installation

More information

A New Algorithm for Solving Shortest Path Problem on a Network with Imprecise Edge Weight

A New Algorithm for Solving Shortest Path Problem on a Network with Imprecise Edge Weight Availabl at http://pvamudu/aam Appl Appl Math ISSN: 193-9466 Vol 6, Issu (Dcmbr 011), pp 60 619 Applications and Applid Mathmatics: An Intrnational Journal (AAM) A Nw Algorithm for Solving Shortst Path

More information

Module 3 Graphing and Optimization

Module 3 Graphing and Optimization Module 3 Graphing and Optimization One of the most important applications of calculus to real-world problems is in the area of optimization. We will utilize the knowledge gained in the previous chapter,

More information

History Rgistr Allotion Exmpl As ol s intrmit o Consir this progrm with six vrils: := + := + := - 1 Us in th originl FORTRAN ompilr (1950 s) Vry ru lg

History Rgistr Allotion Exmpl As ol s intrmit o Consir this progrm with six vrils: := + := + := - 1 Us in th originl FORTRAN ompilr (1950 s) Vry ru lg Th Mmory Hirrhy Avn Compilrs CMPSCI 710 Spring 2003 Highr = smllr, str, losr to CPU A rl sktop mhin (min) Rgistr Allotion Emry Brgr rgistrs 8 intgr, 8 loting-point; 1-yl ltny L1 h 8K t & instrutions; 2-yl

More information

Outline. Tasks for Exercise Six. Exercise Six Goals. Task One: Kinetic Energy Table. Nested for Loops. Laboratory VI Program Control Using Loops

Outline. Tasks for Exercise Six. Exercise Six Goals. Task One: Kinetic Energy Table. Nested for Loops. Laboratory VI Program Control Using Loops Ercis 6 -- Loopig March 9, 6 Laboratory VI Program Cotrol Usig Loops Larry Cartto Computr Scic 6 Computig i Egirig ad Scic Outli Ercis si goals Outli tasks for rcis si Itroduc ida of std loops ad tabl

More information

About Notes And Symbols

About Notes And Symbols About Nots And Symbols by Batric Wildr Contnts Sht 1 Sht 2 Sht 3 Sht 4 Sht 5 Sht 6 Sht 7 Sht 8 Sht 9 Sht 10 Sht 11 Sht 12 Sht 13 Sht 14 Sht 15 Sht 16 Sht 17 Sht 18 Sht 19 Sht 20 Sht 21 Sht 22 Sht 23 Sht

More information

Algebra I. Linear Equations. Slide 1 / 267 Slide 2 / 267. Slide 3 / 267. Slide 3 (Answer) / 267. Slide 4 / 267. Slide 5 / 267

Algebra I. Linear Equations. Slide 1 / 267 Slide 2 / 267. Slide 3 / 267. Slide 3 (Answer) / 267. Slide 4 / 267. Slide 5 / 267 Slide / 67 Slide / 67 lgebra I Graphing Linear Equations -- www.njctl.org Slide / 67 Table of ontents Slide () / 67 Table of ontents Linear Equations lick on the topic to go to that section Linear Equations

More information

Roberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 5. Graph sketching

Roberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 5. Graph sketching Roberto s Notes on Differential Calculus Chapter 8: Graphical analsis Section 5 Graph sketching What ou need to know alread: How to compute and interpret limits How to perform first and second derivative

More information

Intersection-free Dual Contouring on Uniform Grids: An Approach Based on Convex/Concave Analysis

Intersection-free Dual Contouring on Uniform Grids: An Approach Based on Convex/Concave Analysis Intrsction-fr Dual Contouring on Uniform Grids: An Approach Basd on Convx/Concav Analysis Charli C. L. Wang Dpartmnt of Mchanical and Automation Enginring, Th Chins Univrsity of Hong Kong E-mail: cwang@ma.cuhk.du.hk

More information

: Mesh Processing. Chapter 6

: Mesh Processing. Chapter 6 600.657: Msh Procssing Chaptr 6 Quad-Dominant Rmshing Goal: Gnrat a rmshing of th surfac that consists mostly of quads whos dgs align with th principal curvatur dirctions. [Marinov t al. 04] [Alliz t al.

More information

Derivatives 3: The Derivative as a Function

Derivatives 3: The Derivative as a Function Derivatives : The Derivative as a Function 77 Derivatives : The Derivative as a Function Model : Graph of a Function 9 8 7 6 5 g() - - - 5 6 7 8 9 0 5 6 7 8 9 0 5 - - -5-6 -7 Construct Your Understanding

More information

The semantic WEB Roles of XML & RDF

The semantic WEB Roles of XML & RDF Th smantic WEB Rols of XML & RDF STEFAN DECKER AND SERGEY MELNIK FRANK VAN HARMELEN, DIETER FENSEL, AND MICHEL KLEIN JEEN BROEKSTRA MICHAEL ERDMANN IAN HORROCKS Prsntd by: Iniyai Thiruvalluvan CSCI586

More information

ET (mm/d), mean, SCEN-CTL

ET (mm/d), mean, SCEN-CTL a T M (K), man, SCEN-CTL 8 7 6 4 - - - -4 - -6-7 -8 T M (K), stv, SCEN-CTL..8.6.4. -. -.4 -.6 -.8 - -. SM (mm), man, SCEN-CTL 7 - - -7 - - - - SM (mm), stv, SCEN-CTL - - - - - - P (mm/), man, SCEN-CTL...7..

More information

Section 4.2 Graphing Lines

Section 4.2 Graphing Lines Section. Graphing Lines Objectives In this section, ou will learn to: To successfull complete this section, ou need to understand: Identif collinear points. The order of operations (1.) Graph the line

More information

Compiling: Examples and Sample Problems

Compiling: Examples and Sample Problems REs for Kywors Compiling: Exmpls n mpl Prolms IC312 Mchin-Lvl n ystms Progrmming Hnri Csnov (hnric@hwii.u) It is sy to fin RE tht scris ll kywors Ky = if ls for whil int.. Ths cn split in groups if n Kywor

More information

Vignette to package samplingdatacrt

Vignette to package samplingdatacrt Vigntt to packag samplingdatacrt Diana Trutschl Contnts 1 Introduction 1 11 Objctiv 1 1 Diffrnt study typs 1 Multivariat normal distributd data for multilvl data 1 Fixd ffcts part Random part 9 3 Manual

More information

A Rational Existence Introduction to Rational Functions

A Rational Existence Introduction to Rational Functions Lesson. Skills Practice Name Date A Rational Eistence Introduction to Rational Functions Vocabular Write the term that best completes each sentence.. A rational function is an function that can be written

More information

Greedy Algorithms. Interval Scheduling. Greedy Algorithm. Optimality. Greedy Algorithm (cntd) Greed is good. Greed is right. Greed works.

Greedy Algorithms. Interval Scheduling. Greedy Algorithm. Optimality. Greedy Algorithm (cntd) Greed is good. Greed is right. Greed works. Algorithm Grdy Algorithm 5- Grdy Algorithm Grd i good. Grd i right. Grd work. Wall Strt Data Structur and Algorithm Andri Bulatov Algorithm Grdy Algorithm 5- Algorithm Grdy Algorithm 5- Intrval Schduling

More information

Modelling CoCoME with DisCComp

Modelling CoCoME with DisCComp Modlling CoCoME with DiCComp Dagtuhl Workhop, Sbatian Hrold Clauthal Univrity of Tchnology Dpartmnt of Informatic Softwar Sytm Enginring Chair of Prof. Dr. Andra Rauch Ovrviw Introduction Introduction

More information

Store Tours Washington DC

Store Tours Washington DC Things To Look For: Th Customr Journy == Entrn == Cln n inviting? Opning hours post? Wht o you noti vn for you ntr? == First Imprssion == Lighting? Musi plying? Dos th stor fl wloming? Dos somon grt you

More information

Appendix A.6 Functions

Appendix A.6 Functions A. Functions 539 RELATIONS: DOMAIN AND RANGE Appendi A. Functions A relation is a set of ordered pairs. A relation can be a simple set of just a few ordered pairs, such as {(0, ), (1, 3), (, )}, or it

More information

Finding a Funicular Curve Through Two Points

Finding a Funicular Curve Through Two Points This is th glss pyrmi t th Louvr Musum in Pris, sign y rhitt I.M. Pi. It is support from nth y stl ls. In signing strutur suh s this, it is oftn most usful to slt l of rtin siz n tnsil strngth, n thn to

More information

Overview of the Gifted Services Portfolio Process

Overview of the Gifted Services Portfolio Process Saint Paul Public Schools Ovrviw of th Giftd Srvics Portfolio Procss Talnt Dvlopmnt and Acclration Srvics What is th Portfolio Rviw? Th portfolio rviw offrs all studnts th opportunity to b assssd for giftd

More information

Spectral sensitivity and color formats

Spectral sensitivity and color formats FirWir camras Spctral snsitivity and color formats At th "input" of a camra, w hav a CCD chip. It transforms photons into lctrons. Th spctral snsitivity of this transformation is an important charactristic

More information

Graphing Calculator Activities

Graphing Calculator Activities Graphing Calculator Activitis Graphing Calculator Activitis Copyright 009, IPG Publishing IPG Publishing 86 Erin Bay Edn Prairi, innsota 47 phon: (6) 80-9090 www.iplaymathgams.com ISBN 978--948--6 IPG

More information

Syntactic Directed Translation

Syntactic Directed Translation Sntactic Directed Translation What is Sntax-Directed Translation? Translation Process guided b Context-Free Grammars Attach Attributes to Grammar Smbols Attribute Grammars & Sntax-Directed Definitions

More information

GLOBAL EDITION. Interactive Computer Graphics. A Top-Down Approach with WebGL SEVENTH EDITION. Edward Angel Dave Shreiner

GLOBAL EDITION. Interactive Computer Graphics. A Top-Down Approach with WebGL SEVENTH EDITION. Edward Angel Dave Shreiner GLOBAL EDITION Interactive Computer Graphics A Top-Down Approach with WebGL SEVENTH EDITION Edward Angel Dave Shreiner This page is intentionall left blank. 4.10 Concatenation of Transformations 219 in

More information

ECE 573 Midterm 1 September 29, 2009

ECE 573 Midterm 1 September 29, 2009 ECE 573 Midterm 1 September 29, 2009 Name: Purdue email: Please sign the following: I affirm that the answers given on this test are mine and mine alone. I did not receive help from an person or material

More information

Rendering Equation. Physically-Based Rendering. Physically-Based Rendering. Models of Light

Rendering Equation. Physically-Based Rendering. Physically-Based Rendering. Models of Light Rning Equation Phsicall-Bas Rning snthsis algoithms that comput imags b simulation th phsical bhavio of light Comput Gaphics Rning Equation 005 Fabio Pllacini 1 Comput Gaphics Rning Equation 005 Fabio

More information

FSP Synthesis of an off-set five bar-slider mechanism with variable topology

FSP Synthesis of an off-set five bar-slider mechanism with variable topology FSP Synthsis of an off-st fiv bar-slidr mchanism with variabl topology Umsh. M. Daivagna 1*, Shrinivas. S. Balli 2 1 Dpartmnt of Mchanical Enginring, S.T.J.Institut of Tchnology, Ranbnnur, India 2 Dpt.

More information

Interfacing the DP8420A 21A 22A to the AN-538

Interfacing the DP8420A 21A 22A to the AN-538 Intrfacing th DP8420A 21A 22A to th 68000 008 010 INTRODUCTION This application not xplains intrfacing th DP8420A 21A 22A DRAM controllr to th 68000 Thr diffrnt dsigns ar shown and xplaind It is assumd

More information

g(x) h(x) f (x) = Examples sin x +1 tan x!

g(x) h(x) f (x) = Examples sin x +1 tan x! Lecture 4-5A: An Introduction to Rational Functions A Rational Function f () is epressed as a fraction with a functiong() in the numerator and a function h() in the denominator. f () = g() h() Eamples

More information

4.2 Properties of Rational Functions. 188 CHAPTER 4 Polynomial and Rational Functions. Are You Prepared? Answers

4.2 Properties of Rational Functions. 188 CHAPTER 4 Polynomial and Rational Functions. Are You Prepared? Answers 88 CHAPTER 4 Polnomial and Rational Functions 5. Obtain a graph of the function for the values of a, b, and c in the following table. Conjecture a relation between the degree of a polnomial and the number

More information

Efficient Obstacle-Avoiding Rectilinear Steiner Tree Construction

Efficient Obstacle-Avoiding Rectilinear Steiner Tree Construction Efficint Obstacl-Avoiding Rctilinar Stinr Tr Construction Chung-Wi Lin, Szu-Yu Chn, Chi-Fng Li, Yao-Wn Chang, and Chia-Lin Yang Graduat Institut of Elctronics Enginring Dpartmnt of Elctrical Enginring

More information

Perspective Projection Transformation

Perspective Projection Transformation Perspective Projection Transformation Where does a point of a scene appear in an image?? p p Transformation in 3 steps:. scene coordinates => camera coordinates. projection of camera coordinates into image

More information

I - Pre Board Examination

I - Pre Board Examination Cod No: S-080 () Total Pags: 06 KENDRIYA VIDYALAYA SANGATHAN,GUWHATI REGION I - Pr Board Examination - 04-5 Subjct Informatics Practics (Thory) Class - XII Tim: 3 hours Maximum Marks : 70 Instruction :

More information

1-1. Functions. Lesson 1-1. What You ll Learn. Active Vocabulary. Scan Lesson 1-1. Write two things that you already know about functions.

1-1. Functions. Lesson 1-1. What You ll Learn. Active Vocabulary. Scan Lesson 1-1. Write two things that you already know about functions. 1-1 Functions What You ll Learn Scan Lesson 1- Write two things that ou alread know about functions. Lesson 1-1 Active Vocabular New Vocabular Write the definition net to each term. domain dependent variable

More information

Textbook: Chapter 6! CS425 Fall 2013 Boris Glavic! Chapter 3: Formal Relational Query. Relational Algebra! Select Operation Example! Select Operation!

Textbook: Chapter 6! CS425 Fall 2013 Boris Glavic! Chapter 3: Formal Relational Query. Relational Algebra! Select Operation Example! Select Operation! Chapter 3: Formal Relational Query Languages CS425 Fall 2013 Boris Glavic Chapter 3: Formal Relational Query Languages Relational Algebra Tuple Relational Calculus Domain Relational Calculus Textbook:

More information

Branching and Circular Features in High Dimensional Data

Branching and Circular Features in High Dimensional Data 1 Branching an Circular Faturs in High Dimnsional Data Bi Wang, Brian Summa, Valrio Pascucci, an Mikal Vjmo-Johansson UUSCI-2011-005 Scintific Computing an Imaging Institut Univrsity of Utah Salt Lak City,

More information

15-819M: Data, Code, Decisions

15-819M: Data, Code, Decisions 15-819M: Data, Code, Decisions 08: First-Order Logic André Platzer aplatzer@cs.cmu.edu Carnegie Mellon University, Pittsburgh, PA André Platzer (CMU) 15-819M/08: Data, Code, Decisions 1 / 40 Outline 1

More information

THE INVERSE GRAPH. Finding the equation of the inverse. What is a function? LESSON

THE INVERSE GRAPH. Finding the equation of the inverse. What is a function? LESSON LESSON THE INVERSE GRAPH The reflection of a graph in the line = will be the graph of its inverse. f() f () The line = is drawn as the dotted line. Imagine folding the page along the dotted line, the two

More information

Try It. Implicit and Explicit Functions. Video. Exploration A. Differentiating with Respect to x

Try It. Implicit and Explicit Functions. Video. Exploration A. Differentiating with Respect to x SECTION 5 Implicit Differentiation Section 5 Implicit Differentiation Distinguish between functions written in implicit form an eplicit form Use implicit ifferentiation to fin the erivative of a function

More information

A Formal Definition of Limit

A Formal Definition of Limit 5 CHAPTER Limits and Their Properties L + ε L L ε (c, L) c + δ c c δ The - definition of the it of f as approaches c Figure. A Formal Definition of Limit Let s take another look at the informal description

More information

Lecture 1: Conjunctive Queries

Lecture 1: Conjunctive Queries CS 784: Foundations of Data Management Spring 2017 Instructor: Paris Koutris Lecture 1: Conjunctive Queries A database schema R is a set of relations: we will typically use the symbols R, S, T,... to denote

More information

KENDRIYA VIDYALAYA SANGATHAN, CHENNAI REGION CLASS XII COMMON PRE-BOARD EXAMINATION

KENDRIYA VIDYALAYA SANGATHAN, CHENNAI REGION CLASS XII COMMON PRE-BOARD EXAMINATION KENDRIYA VIDYALAYA SANGATHAN, CHENNAI REGION CLASS XII COMMON PRE-BOARD EXAMINATION 03-4 Sub : Informatics Practics (065) Tim allowd : 3 hours Maximum Marks : 70 Instruction : (i) All qustions ar compulsory

More information

Quantification. Using the suggested notation, symbolize the statements expressed by the following sentences.

Quantification. Using the suggested notation, symbolize the statements expressed by the following sentences. Quantification In this and subsequent chapters, we will develop a more formal system of dealing with categorical statements, one that will be much more flexible than traditional logic, allow a deeper analysis

More information

Essential Question How many turning points can the graph of a polynomial function have?

Essential Question How many turning points can the graph of a polynomial function have? .8 Analzing Graphs of Polnomial Functions Essential Question How man turning points can the graph of a polnomial function have? A turning point of the graph of a polnomial function is a point on the graph

More information

Scalable and Robust Management of Dynamic Graph Data

Scalable and Robust Management of Dynamic Graph Data Salabl an Robust Managmnt of Dynami Graph Data Alan G. Labousur, Paul W. Olsn Jr., an Jong-Hyon Hwang {alan, polsn, jhh}@s.albany.u Dpartmnt of Computr Sin, Univrsity at Albany Stat Univrsity of Nw York,

More information

Gernot Hoffmann Sphere Tessellation by Icosahedron Subdivision. Contents

Gernot Hoffmann Sphere Tessellation by Icosahedron Subdivision. Contents Grnot Hoffmann Sphr Tssllation by Icosahdron Subdivision Contnts 1. Vrtx Coordinats. Edg Subdivision 3 3. Triangl Subdivision 4 4. Edg lngths 5 5. Normal Vctors 6 6. Subdividd Icosahdrons 7 7. Txtur Mapping

More information

Robust and Fault Tolerant Clock Synchronization Nikolaus Kerö, Oregano Systems Aneeq Mahmood, ZISS Thomas Kernen, Cisco Felix Ring, ZISS Tobias

Robust and Fault Tolerant Clock Synchronization Nikolaus Kerö, Oregano Systems Aneeq Mahmood, ZISS Thomas Kernen, Cisco Felix Ring, ZISS Tobias Robust and Fault Tolrant Clock Synchronization Nikolaus Krö, Organo Systms Anq Mahmood, ZISS Thomas Krnn, Cisco Flix Ring, ZISS Tobias Müllr, Organo Systms Thomas Biglr, ZISS Rational Common notion of

More information

Encryption as an Abstract Datatype:

Encryption as an Abstract Datatype: June 2003 1/18 Outline Encryption as an Abstract Datatype: an extended abstract Dale Miller INRIA/Futurs/Saclay and École polytechnique 1. Security protocols specified using multisets rewriting. 2. Eigenvariables

More information

Reimbursement Requests in WORKS

Reimbursement Requests in WORKS Rimbursmnt Rqusts in WORKS Important points about Rimbursmnts in Works Rimbursmnt Rqust is th procss by which UD mploys will b rimbursd for businss xpnss paid using prsonal funds. Rimbursmnt Rqust can

More information

12.1. Angle Relationships. Identifying Complementary, Supplementary Angles. Goal: Classify special pairs of angles. Vocabulary. Complementary. angles.

12.1. Angle Relationships. Identifying Complementary, Supplementary Angles. Goal: Classify special pairs of angles. Vocabulary. Complementary. angles. . Angle Relationships Goal: Classif special pairs of angles. Vocabular Complementar angles: Supplementar angles: Vertical angles: Eample Identifing Complementar, Supplementar Angles In quadrilateral PQRS,

More information

CLF: A logical framework for concurrent systems

CLF: A logical framework for concurrent systems CLF: A logical framework for concurrent systems Thesis Proposal Kevin Watkins Carnegie Mellon University Committee: Frank Pfenning, CMU (Chair) Stephen Brookes, CMU Robert Harper, CMU Gordon Plotkin, University

More information

Objectives. Two Ways to Implement Lists. Lists. Chapter 24 Implementing Lists, Stacks, Queues, and Priority Queues

Objectives. Two Ways to Implement Lists. Lists. Chapter 24 Implementing Lists, Stacks, Queues, and Priority Queues Chaptr 24 Implmnting Lists, Stacks, Quus, and Priority Quus CS2: Data Structurs and Algorithms Colorado Stat Univrsity Original slids by Danil Liang Modifid slids by Chris Wilcox Objctivs q To dsign common

More information

2.3. One-to-One and Inverse Functions. Introduction. Prerequisites. Learning Outcomes

2.3. One-to-One and Inverse Functions. Introduction. Prerequisites. Learning Outcomes One-to-One and Inverse Functions 2. Introduction In this Section we eamine more terminolog associated with functions. We eplain one-to-one and man-to-one functions and show how the rule associated with

More information

1. Trace the array for Bubble sort 34, 8, 64, 51, 32, 21. And fill in the following table

1. Trace the array for Bubble sort 34, 8, 64, 51, 32, 21. And fill in the following table 1. Trac th array for Bubbl sort 34, 8, 64, 51, 3, 1. And fill in th following tabl bubbl(intgr Array x, Intgr n) Stp 1: Intgr hold, j, pass; Stp : Boolan switchd = TRUE; Stp 3: for pass = 0 to (n - 1 &&

More information